Israel’s activity and presence in Azerbaijan on the northern border of Iran is aimed at exerting pressure on Iran and conducting security and intelligence activity against it and at getting prepared for the delusion of bombing Iran’s nuclear facilities….Because of its strategic location, Azerbaijan offers Israel a springboard for espionage, military activity, and assassinating Iranian nuclear scientists. The paper also refers to the military contracts signed between the two states, amounting to “$1.6 billion in defensive missiles and UAVs.”
The security services of the Commonwealth of Independent States (CIS) member states will be closely monitoring the movement of mercenaries from CIS nations fighting in Syria, Russia’s Federal Security Service (FSB) head Alexander Bortnikov said on Wednesday.
According to the FSB, some 200 mercenaries from Russia, as well as from CIS member states and Europe, are fighting in Syria’s civil war. “They [mercenaries] pose a severe danger. It is highly important to track their movements following the end of hostilities,” the FSB chief said. The future fate of mercenaries active in Syria is of concern not only to the CIS special services, but European secret services as well, Bortnikov added.
THE federal government has unveiled plans to wind back the nation’s counter-terror laws and strip ASIO of its power to detain terror suspects without charge.
If implemented, the sweeping changes would abolish some offences, impose expanded judicial oversight on ASIO and repeal the criminal penalties for praising acts of terrorism. Those who are subject to control orders would be given access to mobile phones and the internet, could not be ordered to relocate and any curfew would be limited to 10 hours a day.
Bitcoin has come onto the radar of the UK government, with officials gathering in London on Monday to discuss the security threats and tax concerns posed by the digital currency.
About 50 civil servants from HM Revenue and Customs, the Serious Organised Crime Agency, Home Office and GCHQ – the intelligence listening service – held a one-day conference which examined how bitcoin works and how criminals might seek to exploit the electronic cash system, which is currently unregulated by any financial authority.
For someone who spent a lonely life in a Pakistani jail for more than two decades of his life, the public farewell that Sarabjit Singh received on his death was rather remarkable.
After news broke that Singh – held by Pakistan since 1990 for allegedly being a spy and plotting two bomb attacks that killed 14 – had succumbed to his injuries after being beaten by fellow inmates, anger and outrage swept India. Stung by the mood on the street, the government organised a state funeral for him – televised live after a visibly embarrassed Pakistan sent back his body.
The CIA evaluates its Chinese counterparts by browsing through their works to gauge whether or not the Chinese military official displays any potential for insightful independent thought. In addition, software exists to distinguish the characters and ambitions of Chinese political figures.
The CIA and US Defense Department have compiled various psychological analyses on eminent political figures, including the late Venezuelan president Hugo Chavez and late North Korean president Kim Jong-il.
The “Jewish Department” of the Shin Bet, Israel’s internal security service, is known to recruit members of communities where covert illegal activity is suspected, to spy against their friends and neighbors. On Monday, an expose aired by the television show Uvda showed what the Shin Bet does when it cannot find people willing to cooperate with it.
The annual public accounting of Estonia’s security and intelligence agency, Kapo, details numerous activities with which Russia’s clandestine services gathers information and aids the implementation of the Kremlin’s foreign policy.
The Kapo report states that in the last few years the Russian FSB’s attempts at recruitment in Estonia have substantially grown. One can then assume that the focus of the FSB toward Estonia has intensified.g
The FBI is asking for is the ability to fine those companies that don’t comply with a wiretap order, even if they’re technically unable to do so within a time limit set by the FBI.
In other words, if you can’t provide the feds with a back door to your system, the government will keep piling on fines until you go out of business. The idea, of course, is to compel companies that provide secure communications to also build in a means for the feds carry out get their wiretaps.
IRS to Spy on Our Shopping Records, Travel, Social Interactions, Health Records and Files from Other Government Investigators
Starting this year, the IRS tools will be able to track all credit card transactions, for starters. The agency has also instructed agents on using online sources such as social media and e-commerce sites including eBay, as well as the rich data generated by mobile devices. In one controversial disclosure in April, the ACLU showed documents in which the IRS general counsel said the agency could look at emails without warrants, but the IRS has said it will not use this power.
Should Facebook, Google and similar sites be forced to adapt their infrastructure so that the FBI and other law enforcement agencies can easily tap suspects’ communications in real time? That’s the impetus behind new wiretap guidelines being drawn up by a government panel, according to the Washington Post. The draft guidelines, championed by the FBI, would allow courts to impose escalating fines on any business that didn’t immediately comply with a court-ordered request for real-time communications interception, regardless of whether the Web service provider said such interception was technically feasible.
South Korean prosecutors raided the country’s spy agency as part of a probe into allegations that it meddled in the presidential election in December, a news report said. Prosecutors raided the country’s spy agency as part of a probe into allegations that it meddled in the presidential vote. A team of about 25 prosecutors and investigators from the Seoul Central District Prosecutors’ Office seized digital files and documents from the National Intelligence Service (NIS) in the capital, Yonhap news agency said. The agency’s anti-North Korea psychological warfare team allegedly posted a slew of politically sensitive comments on the Internet against the opposition candidate to influence public opinion ahead of the December poll.
STATE security minister Sydney Sekeramayi has said it was ironic that the West was leading calls for so-called security sector reforms having helped train the country’s defence and security establishment for more than 20 years. He said: “The British Military Advisory and Training Team left the country in 2001 after a 20-year stint with our army. They did not complain then, why now? “In the same vein, the President’s Department held various exchange programmes with other Western intelligence services among them CIA, BND (Germany intelligence) and M16.”
A company staffed with former operatives of Israel’s top intelligence agencies and founded with the help of the former head of the Mossad is being used by hedge funds looking for an edge in the financial markets. Kela Israeli Intelligence has increasingly become a popular service on Wall Street. The firm employs about 40 former intelligence operatives and analysts, most of them ex-members of the Israeli army’s secretive 8200 unit, which is often described as Israel’s equivalent to the National Security Agency and believed to be behind the Stuxnet computer worm that attacked Iran’s nuclear facilities.
Tension is rising on the Israel-Syria cease-fire line on the Golan Heights and Israeli Prime Minister Binyamin Netanyahu says he’s ready to launch military operation to prevent the weakening Damascus regime’s chemical and other advanced weapons falling into Islamist hands. “We see a deterioration of the general chain of command” in the Syrian-held sector of the Golan, said Lt. Col. Peter Lerner, an Israeli military spokesman. But the Israelis see the main threat to them as the jihadists acquiring the regime’s well-stocked arsenals of chemical weapons and advanced systems such as Russian-made Scud-B ballistic missiles, which can carry chemical warheads, and surface-to-air missiles that would challenge Israel’s long-held air supremacy in the region.
In recent years, the state of Washington has issued nearly 300 fictitious driver licenses to the CIA. That’s according to public records initially disclosed, but now withheld, by state officials. The state’s cooperation with the nation’s premier spy agency has been a secret for years — unknown to lawmakers and even the governor.
Inside Washington’s Department of Licensing is a special office called the License Integrity Unit. This is where police officers who are going undercover can come to get a fake identity. It’s a valid Washington driver license, but with a fictitious name, birthdate and address. It’s known as the confidential driver license program. It’s operated for decades, but without legislative approval.
The Central Intelligence Agency conspired with dozens of governments to build a secret extraordinary rendition and detention program that spanned the globe. Extraordinary rendition is the transfer—without legal process—of a detainee to the custody of a foreign government for purposes of detention and interrogation. In the Open Society Justice Initiative’s new report, it stripped people of their most basic rights, facilitated gruesome forms of torture, at times captured the wrong people, and debased the United States’ human rights reputation world-wide.
Over 25 years after his stint as a spy in Dresden for the Soviet KGB, Russian President Vladimir Putin is increasing surveillance of the German government as the Kremlin ratchets up its anti-German rhetoric, Der Spiegel magazine reported on Monday. After several years of relatively relaxed relations between Russia and Germany, cracks in their strategic friendship are appearing once again, wrote the magazine. In the latest incident, the Kremlin’s intelligence service, the FSB, began squeezing Russian employees of the German embassy in Moscow for information.
Russia’s facebook like service accused of collaborating with FSB to strangle anti-Putin user activity
Russia’s leading social network, Vkontakte.ru (also known as VK.com), has cooperated with the FSB – the post-Soviet successor to the KGB – in manipulating user trust and disregarding its own privacy rules, charged opposition-minded daily Novaya Gazeta.
In a denunciation that has galvanized opinions in Russia’s digital domain for the last ten days, Novaya accused the social network of behind-the-scenes political scheming back in late 2011 and early 2012. Amid the political turmoil that followed the controversial parliamentary and presidential elections, Vkontakte is reported to have given away users’ personal data to the FSB and also blocked some users who supported the political opposition.
‘Castle of the Lake’ intelligence command and control system being developed to deliver military decision-makers information from every possible source.In a hypothetical yet plausible situation, a very senior IDF commander is sitting at home, when he is alerted of a developing threat over the border.
As he makes his way to IDF headquarters in Tel Aviv to meet with army brass, the commander pulls out a handheld military communications device, which sends and receives highly encrypted broadcasts.
Saudi authorities have called in several influential Shiite Muslim clerics and intellectuals for questioning, as last month’s arrest of 16 people on charges of spying for Iran threatens to raise tensions between leaders of the religious minority and the government in the oil-rich kingdom.
The trigger for the summons was the Shiite community’s angry reaction to last month’s arrest of 16 Saudi Shiites, who are accused of providing information and documents to Iran, allegations that Iran denies.
On November 14, 2006, a man going by the name Paul William Hampel was arrested at a Canadian airport on charges of being a Russian spy. Hampel’s carefully constructed identity portrayed him as a successful businessman, yet for a decade his company did no business. Only months before his capture, the same apparatus used to create his alias was also employed by a very different spy agency – the U.S. Central Intelligence Agency —to build a secret prison in Lithuania, where U.S. agents interrogated suspected al-Qaeda terrorists. Earlier again, it was used by the regime of former Iraqi dictator Saddam Hussein to cheat the Oil for Food program.
Uganda is “at risk of violent instability” come next year (2014), a US Intelligence threat assessment report has stated. The report, that is released every four years after the US President is elected, by the National Intelligence Council, names Uganda among 14 other countries that risk becoming a failed state, given their potential for conflict and environmental evils. The US Intelligence threat assessment report also places Burundi and the Democratic Republic of Congo as two other countries in the region likely to suffer in the same manner.
Concerned over mounting cases of service tax evasion, the Government is mulling to create a separate intelligence unit to check the menace and stop leakage of revenue.
The proposed Directorate of Anti Evasion to check service tax evasion is likely to be set up by the Finance Ministry close on the lines of two other intelligence agencies under it–Directorate General of Revenue Intelligence (DRI) and Directorate General of Central Excise Intelligence (DGCEI), official sources said.
A group of radio monitoring enthusiasts dutifully log all of the broadcasts on the Air Force’s High Frequency Global Communications System. The HFGCS, stood up in 1992, is a reliable, redundant worldwide communications network that allows deployed aircraft to talk with fixed and flying command and control centers. There are 13 base stations across the world, ensuring virtual global coverage with plenty of overlap. The frequencies are published openly; the broadcasts are analog (although a digital transition is coming) and in the clear because secure telephones and secure HF radio networks don’t work well together yet.
The Yakima facility has been mentioned in several books on national security but otherwise hasn’t attracted widespread attention. James Bamford, whose groundbreaking 1982 book about the NSA, “The Puzzle Palace,” has said the Yakima facility has played a major role for decades in Echelon, the global surveillance network operated by the NSA and its counterparts in the British Commonwealth: Britain, Canada, Australia and New Zealand. The system has been reported to be capable of intercepting satellite communications traffic, such as emails and calls, from cellphones.
Israeli spying equipment has been found hidden in artificial rocks on an uninhabited island opposite the Syrian port of Tartus, where it was being used to monitor Russian naval movements. Three large espionage devices were discovered by fishermen on the tiny Ant Island near a naval base regarded by Moscow as an important strategic asset in the Mediterranean. According to Al-Manar, a pro-Syrian television station in neighbouring Lebanon, the “rocks” could track and film Russian warship movements and instantly transmit pictures back to Israel by satellite.
Shama Ha-Cohen reveals in his Knesset website what he worked in Aman, the IDF military intelligence department. He served there in a group that was called the “special unit for counter-espionage and special investigations” (היחידה המיוחדת לסיכול ריגול וחקירות מיוחדות). As is usual for Israeli spookery, this is spy lingo that euphemizes the real nature of what the group did. “Special investigations” means it engaged in, among other things, foreign assassinations.
The U.S. government is expanding a cybersecurity program that scans Internet traffic headed into and out of defense contractors to include far more of the country’s private, civilian-run infrastructure.
As a result, more private sector employees than ever before, including those at big banks, utilities and key transportation companies, will have their emails and Web surfing scanned as a precaution against cyber attacks.
The question is not what can membership in the European Union do for us in the UK, but what can we do for the EU? There is one way in which we British can strengthen the benefits of union. We can demand and nourish a European Intelligence Service (EIS). Forget the parochial moaning, the time is ripe for such an initiative.
In the last century it came to be accepted that effective intelligence can not only win wars and minimize civilian casualties, it can also help to prevent war — precisely the main aim of the EU, as its recent Nobel Prize confirmed.
During his nearly half-hour talk, CIA CTO Ira Hunt said that the agency is interested in “really big data,” or storage capacity on a scale unlike anything currently existing on the planet, so they can “connect the dots” with what’s happening in real time.“Since you can’t connect dots you don’t have, it drives us into a mode of, we fundamentally try to collect everything and hang on to it forever.”“It is really very nearly within our grasp to be able to compute on all human generated information,” he added, explaining that nearly all mobile phones now contain a camera, a microphone, a light sensor, an accelerometer and GPS, among other sensors.
Afghanistan is considered to have a highly strategic value during the 21st century in southern and central Asian regions, owed to its geopolitical situation and untapped mineral resources. The country has proven to be a key inhibitor for the newly formed republics in central Asia besides having a high influence and pressure on China, Russia and Iran. Geographical and geopolitical situation of a nation has a direct impact over the internal, external and economical policies of a nation. However, policies implemented by ISI, CIA and MI6 in Afghanistan and the region during the past five decades have had different motives
China has sparked off a fresh scare in India’s national security establishment, this time with its little-known collaboration with neighbouring countries’ space-related programmes, adding a new dimension to fears among intelligence agencies the eastern neighbour was encircling India strategically with large communication networks. A string of satellite deals China has struck with Sri Lanka, potential space-related partnerships in Maldives and Bangladesh and their security implications have raised concern in New Delhi.
According to the explanatory memorandum to the bill that President Vladimir Putin has submitted to the State Duma, FSB operatives are now being dispatched to foreign states for up to six months “to provide advice and guidance to their intelligence and law enforcement agencies in conducting operational, search and other special activities.” For the time being, those detachments will be sent only to Abkhazia, South Ossetia and Kyrgyzstan. The goal is to give them the opportunity to serve as permanent advisers.
National Intelligence Service documents have surfaced showing director Won Sei-hoon, 62, ordering his employees to interfere directly in national politics. They include a number of orders and requests calling for political interference, including manipulating public opinion ahead of the presidential election, increased efforts by Kim’s psychological warfare team to win over younger people, efforts to combat criticisms of the government by religious groups, and a public opinion campaign on behalf of state efforts such as the Four Major Rivers project.
Venezuela’s acting president urged U.S. President Barack Obama to stop what he called a plot by the Pentagon and the Central Intelligence Agency to kill his opposition rival and trigger a coup ahead of an April 14 election.
Nicolas Maduro said the plan was to blame the murder on the OPEC nation’s government and to “fill Venezuelans with hate” as they prepare to vote following the death of socialist leader Hugo Chavez. Maduro first mentioned a plot against his rival, Henrique Capriles, last week. He blamed it on former Bush administration officials Roger Noriega and Otto Reich. Both rejected the claim as untrue, outrageous and defamatory.
It is a perennial problem in military operations that there is never enough satellite capacity to satisfy commanders’ gargantuan appetite for voice and data communications.
The bandwidth crunch is expected to worsen in coming years as the Pentagon increases deployments of remotely piloted aircraft for around-the-clock surveillance in many parts of the world. Anticipated requirements for satellite communications will far outstrip capacity, officials have predicted.
“Blackwater’s work with the CIA began when we provided specialized instructors and facilities that the Agency lacked,” Prince told me recently, in response to written questions. “In the years that followed, the company became a virtual extension of the CIA because we were asked time and again to carry out dangerous missions, which the Agency either could not or would not do in-house.”
A prime example of the close relationship appears to have unfolded on March 19, 2005. On that day, Prince and senior CIA officers joined King Abdullah of Jordan and his brothers on a trip to Blackwater headquarters in Moyock, North Carolina, according to lawyers for the company and former Blackwater officials.
The US and its allies must be viewing this convergence of Chinese, Pakistani and Iranian strategic and economic interests in Gwadar and Balochistan with extreme trepidation. In one fell swoop, the Straits of Hormuz and the Sea Lines of Communication (SLOCs) to and from the Persian Gulf have come under Chinese oversight.
Furthermore, regional economies are getting integrated “independent” of Western influence and domination. The prospects of a network of oil and gas pipelines (IP, even TAPI) flowing from the Middle East (ME) and CARs to Pakistan and China are that much brighter now.
In a recent interview, Afghanistan’s Deputy National Security Adviser (DNSA) Rahmatullah Nabil accused the ISI of plotting terror attacks to destabilise the country. He reportedly said that Afghanistan would push the United States to put the ISI on its terror ban list and demand sanctions on it.
The strongly-worded official Afghan reaction would certainly affect outside efforts to stitch an agreement between Afghanistan and Pakistan on bringing the Taliban into government. However, India refused to back Nabil’s latest call for a ban on the ISI.
There are about 79 million BlackBerry subscribers worldwide—and India’s government wants to hand its spy agency data on every one of them. In late 2012, back when it was still officially known as Research in Motion, the company behind BlackBerry handsets worked with the Indian government to enable surveillance of Blackberry Messenger and Blackberry Internet Service emails. But now India’s authorities are complaining that they can only spy on communications sent between the estimated 1 million BlackBerry users in India—and they want a list of all BlackBerry handsets across the globe.
“The problem with the Brotherhood is that they came to power but are still dealing with the nation as they did when they were in the opposition,” said Abdel-Jalil el-Sharnoubi, former editor-in-chief of the group’s website who left the Brotherhood in May 2011.
“Because they cannot trust the state, they have created their own,” he added. The notion of a state within a state has precedents elsewhere in the Arab world. In Lebanon, the Iranian-backed Shiite Hezbollah is the de facto government in much of the south and east of the country and has its own army and telephone network.
All personal information stored by British internet users on major “cloud” computing services including Google Drive can be spied upon routinely without their knowledge by US authorities under newly-approved legislation, it can be disclosed.
Cloud computing has exploded in recent years as a flexible, cheap way for individuals, companies and government bodies to remotely store documents and data. According to some estimates, 35 per cent of UK firms use some sort of cloud system. But it has now emerged that all documents uploaded on to cloud systems based in the US or falling under Washington’s jurisdiction can be accessed and analysed without a warrant by American security agencies.
Japan is to launch a new spy satellite on Sunday to strengthen its monitoring capabilities amid concern that North Korea may carry out more missile and nuclear tests. A rocket carrying a radar-equipped satellite is scheduled to blast off from a space centre at Tanegashima in the southwest, the Japan Aerospace Exploration Agency has announced. The space agency said the satellite would be used for information-gathering, including data following Japan’s 2011 quake and tsunami, but did not mention North Korea by name.
The spectacular abduction of workers at a Saharan gas complex in the eastern desert of Algeria by Islamic militants (and the subsequent raid by government forces that killed dozens of both hostages and kidnappers) has placed a harsh glare on a country that typically avoids the international media spotlight.
Algeria, a vast, sparsely populated, natural resource-rich nation in North Africa that gained independence from France 50 years ago, largely avoided the turmoil of the Arab Spring revolution that toppled governments in neighboring Tunisia and Libya, and is one of the most repressive states in the world. Ruled by the dominant Front de Libération Nationale (FLN) – or National Liberation Front – since the country’s violent birth in 1962, Algerian domestic and foreign policy has actually been dictated by the government’s super-secret state intelligence agency.
At the forefront of the military operation in Mali, France has according to several experts information American drones and satellites, in addition to its own intelligence capabilities, which are one of keys to success. Bilateral exchanges of human intelligence (agents) and techniques (tapping, imagery …) for ages, the military intelligence and French civilians maintain ongoing relationships but with the utmost discretion their American and European counterparts.
n this case, between the DIA (Defense intelligence agency, intelligence agency of the U.S. defense) and the Directorate of Military Intelligence (DRM, France) and from the American CIA and the sprawling NSA (National security agency, tapping U.S.) on the one hand and the General Directorate for External Security (DGSE) and the Central Directorate of Internal Intelligence (DCRI) on the other.”
The seven men were among 11 suspected militants captured in connection with a 2007 suicide bombing against ISI personnel and a rocket attack a year later against an air force base. An anti-terrorism court ordered them to be freed in May 2010, but they were picked up again near the capital, Islamabad.
Four died in custody under mysterious circumstances. The ISI produced the seven surviving men in court last February in response to a judicial order prompted by their relatives, who were looking for them. Two of the men were too weak to walk. Another wore a urine bag, suggesting a kidney ailment. In a meeting with their families on the court premises, they complained of harsh treatment during their detention.
The Obama administration is finalising a rule book for target killings but these restrictions will not apply to Pakistan where the CIA will be free to direct drone strikes in Fata. The classified manual, called a counter-terrorism “playbook”, sets out stringent rules for targeted killings and details the process of adding names to the so-called “kill list”. But it “leaves open a major exemption for the CIA’s campaign of drone strikes in Pakistan”, The Washington Post reported on Sunday.
It is being hailed as the first-ever Mexican counterpart to the CIA. But for this new “superministry” of government, established secretly over the past few weeks by just-installed President Enrique Peña Nieto, the main targets are the powerful and bloody organized crime networks that control the vast drug trade.
The objective of the National Intelligence Center (CNI) is to gather all the information generated by every Mexican governmental body linked to security and law enforcement.
On Jan. 2 the Electronic Privacy Information Center (EPIC) published 190 pages of documents released by the National Security Agency under a Freedom of Information Act (FOIA) request.
The documents confirm key details of the program, known as PerfectCitizen, which was revealed by The Wall Street Journal in an article published in July 2010. The project, for example, includes a major effort to find and remediate vulnerabilities in sensitive control systems (SCS). Technology giant Raytheon received the contract for the program valued at approximately $100 million.
Africa (AFRICOM) command and its Identity Resolution Team now cooperate with US Immigration and Customs Enforcement (ICE) for conducting operations in Eastern Africa.Objective: to identify some “bad actors” (KST to known suspected terrorists, the SIA for special interest alien): traffickers, criminal, terrorists likely to attempt to travel to the United States.
The nationals of several countries of Eastern Africa are in the crosshairs: Kenya, Tanzania, Sudan, Uganda, Ethiopians, Somalis. But the Sahel and West Africa are now treated as sensitive areas.
Qassem Suleimani, the commander of the Qods Force, a division of the Iranian Islamic Revolutionary Guard Corps which conducts special operations outside Iran, visited Egypt at the end of December at the invitation of President Mohamed Morsi’s government.
The Times of London reported that the purpose of the visit was “to advise the government on building its security and intelligence apparatus independent of the national intelligence services, which are controlled by Egypt’s military.” During the visit he met with Essam al-Haddad, foreign affairs adviser to Mr Morsi, and officials from the Muslim Brotherhood.
Governments should promote “national intelligence” to cope with the advancement of high technology such as IT and biotechnology rather than just creating national wealth, a leading futurist said Wednesday.
Jerome Glenn, co-founder and director of the Millennium Project, stressed the state’s active role in preparing for the future, saying governments should set as a long-term goal raising the intellectual capabilities of individuals and strongly pushing ahead with the plan.
Speaking to a select group of journalists at the Defence Ministry, the defence secretary said Pakistan had complete information about the CIA agents working in the country. He said Pakistan has been informed by the US regarding presence of the CIA agents.
He added that no country was allowed to work undercover in the country. “The CIA also uses the agencies of other countries.” He said the US and Britain are against the nuclear assets of Pakistan, adding that America is using agencies of other countries against the country.
Intelligence officials in Australia are demanding legal immunity to infiltrate and train with terrorist groups like Al-Qaeda.
The Attorney-General’s Department wants to authorise Australian Security Intelligence Organisation (ASIO) agents and informants to provide training to, or be trained by, terrorists in covert missions. Bur agents risk criminal prosecution for ‘associating covertly with targets’ even if they are collecting intelligence. According to the Australian, a department spokeswoman said ASIO officers wanted the same legal immunity granted to police working undercover.
SAP Situational Awareness can help agencies improve their available information to sense, predict and act in real time. It facilitates rapid decision making with technology that includes:
SAP HANA: provides insight from massive amounts of incoming public safety data
SAP Business Objects BI: delivers information to command-and-control centers
SAP Sybase Mobile platform: makes data accessible to police officers and first responders via mobile devices, helping them to better anticipate and respond to rapidly evolving situations
The rapid collapse of a U.S. diplomatic compound in Libya exposed the vulnerabilities of State Department facilities overseas. Two of the Americans killed in Benghazi were members of the CIA’s Global Response Staff, an innocuously named organization that has recruited hundreds of former U.S. Special Forces operatives to serve as armed guards for the agency’s spies.
The GRS, as it is known, is designed to stay in the shadows, training teams to work undercover and provide an unobtrusive layer of security for CIA officers in high-risk outposts.
Newly released files show a secret National Security Agency program is targeting the computerized systems that control utilities to discover security vulnerabilities, which can be used to defend the United States or disrupt the infrastructure of other nations.
The NSA’s so-called Perfect Citizen program conducts “vulnerability exploration and research” against the computerized controllers that control “large-scale” utilities including power grids and natural gas pipelines, the documents show. The program is scheduled to continue through at least September 2014.
The US State Department’s decision to extend immunity to two former ISI chiefs in the 26/11 Mumbai terror attacks case is in accordance with a clandestine understanding reached between Admiral Mike Mullen and General Ashfaq Kayani during a day-long meeting held at a secluded resort in Oman on February 22, 2011.
The State Department informed a New York federal court on December 19 that the ISI and two of its former director generals enjoyed immunity and cannot be tried in the Mumbai terror attacks case.
THE authoritarian president of Belarus has praised his regime’s secret police as representing the “best traditions” of the Cheka, the feared forerunner of Soviet Russia’s KGB.
Alexander Lukashenko used his annual “State Security Day” address to boost that his secret police could trace its lineage back to the Cheka, which murdered and tortured thousands of people during the Red Terror campaign in post-revolutionary Russia.
We have numerous stories of intelligence failure and successes in peace and war but the recent stories of intelligence failure in Afghanistan need to be highlighted in detail where technologically strong western and European intelligence agencies have failed badly in gathering high quality information about the Taliban networks. The recent suicide attack on the Afghan intelligence chief, Mr Assadullah Khalid, is a big example of the failure of intelligence.
The intelligence community is developing a single cloud computing network to allow all its analysts to access and rapidly sift through massive volumes of data. When fully complete, this effort will create a pan-agency cloud, with organizations sharing many of the same computing resources and information. More importantly, the hope is the system will break down existing boundaries between agencies and change their insular cultures.
A briefing note prepared for the country’s top soldier shows the army has pushed the military’s chief of intelligence to permanently staff “high-readiness” intelligence positions within brigades and all-source intelligence centres that could be called upon to deploy overseas.
The documents, obtained by The Canadian Press under access to information laws, also show the army is anxious to protect its network of human sources and operatives, known as HUMINT, and to better resource its counter-intelligence abilities.
CIA agents tortured a German citizen, sodomising, shackling, and beating him, as Macedonian state police looked on, the European court of human rights said in a historic judgment released on Thursday.
In a unanimous ruling, it also found Macedonia guilty of torturing, abusing, and secretly imprisoning Khaled el-Masri, a German of Lebanese origin allegedly linked to terrorist organisations. Masri was seized in Macedonia in December 2003 and handed over to a CIA “rendition team” at Skopje airport and secretly flown to Afghanistan.
The Military Intelligence (MI) has started a country wide exercise to collect all sorts of information from Journalists, a report said on Wednesday.
Their personnel’s are providing a two-page form in Urdu language to all the journalists and media representatives in the country in which they are obliged to fill all the necessary information about themselves. We saw names of nearly a hundred well known media personalities, including women journalists who live on their own and even included one columnist who is a sitting member of Parliament.
The military is likely to use unmanned drones to undertake reconnaissance patrols around the coast of the UK and for Nato operations rather than replacing the RAF’s iconic Nimrod spy planes.
Philip Hammond, the defence secretary, said today (WEDS) using unmanned aerial vehicles (UAVs) would be cheaper and less risky than developing an expensive new version of Nimrod, which was scrapped as part of the cuts set out in the 2010 Strategic Defence and Security Review (SDSR).
The Pentagon is planning a major expansion of America’s international spy network, creating a new generation of undercover agents to get a better handle on critical issues such as China’s growing military might and the rising influence of fundamentalist militants in Africa.
The enlarged military spy ring will rival the civilian Central Intelligence Agency in size, marking a major expansion in America’s espionage network – something that reflects the Obama administration’s preference for undercover operations over conventional force.
Stalking is part of the curriculum in the Cyber Corps, an unusual two-year program at the University of Tulsa that teaches students how to spy in cyberspace, the latest frontier in espionage.
Students learn not only how to rifle through trash, sneak a tracking device onto a car and plant false information on Facebook, they also are taught to write computer viruses, hack digital networks, crack passwords, plant listening devices and mine data from broken cell phones and flash drives. The little-known program has funneled most of its graduates to the CIA and the Pentagon’s National Security Agency, which conducts America’s digital spying.
With the new vacancy on the fifth floor at Langley, a robust debate has resumed over whether the Central Intelligence Agency should continue trending toward paramilitary activity and targeted killings, or return to its traditional focus on sending spies to recruit agents and collect human intelligence.
The controversy was foreseen as early as 2003, when Robert Kaplan essentially argued one side of the discussion now underway. He pointed to the “old rules” whereby small groups of men overthrew large governments, and asserted that future technological developments will “make assassinations far more feasible…”
A sub-committee of the Senate Functional Committee on Human Rights has prepared a draft bill proposing the establishment of an Inter-Service Intelligence Agency (ISIA) to be overseen by the country’s prime minister.
The agency will be responsible for arresting, detaining, interrogating and prosecuting suspects to deal effectively with the challenges of national security and matters related to it. The proposed legislation is called Inter Service Intelligence Agency (Functions, Powers and Regulation) Act 2012.
11 November representatives of disparate Syrian groups were combined to form the national coalition of revolutionary and oppositional forces “(NKROS), all the seats and positions in which the head of the American delegation had distributed at the Conference in Doha, United States Ambassador to Syria, Robert S. Ford.
In 2004-2006/07 he worked as Assistant to John Negroponte, the head of a diplomatic mission in Iraq and the United States engaged in war, the methods used there in Honduras: using” death squads “and” Nicaraguan Contras. “the same model that Ford used for destabilization of the situation in Syria.
Syrian rebels announced the creation of a security service to “defend the Syrian revolution” in a country that has been awash with feared intelligence agencies for the past five decades.
Its objective is “to be a powerful security shield to protect the sons of the revolution from attacks, arrests and killings,” and to hunt down members of the opposition who have committed abuses, according to a video statement by the rebels.
The first question to ask: Has the CIA become too much of a paramilitary organization? The second: Should this be the time to put the agency’s main emphasis on being the premier producer and analyst of intelligence for policymakers, using both open and clandestine sources?
That doesn’t mean losing its counterterrorism role. Terrorists remain a threat, but the rest of the world is changing so fast that the president and policymakers down the line need the best information available.
Most cryptography is based on public-key infrastructure, a 35-year-old encryption and decryption technique that underlies the secure electronic communications of law enforcement, government agencies, financial institutions, and even billions of dollars of consumer e-commerce. To crack such systems, a code breaker would need to compute the lengthy prime numbers that are mathematical factors of huge numbers. That’s been a daunting challenge — so far.
One of the most curious of alliances in the Middle East have been the clandestine goings on between the Zionist State of Israel and the Saudi royal family, the guardians of Mecca, among the most conservative of Arab monarchs. As I wrote in a previous blog, that relationship is based on a venerable political tenet: the enemy of my enemy is my friend. The common enemy, in this case, being Iran, radical Islam, and the political upheaval known as the Arab Spring.
Facebook, Twitter, LinkedIn, Google+, Pinterest: All of them could be the source of valuable intelligence that the UK’s intelligence agencies want to know about. And now, government eavesdropping and security agency GCHQ is developing new tools to sift through them for nuggets of useful data.
The Cheltenham-based organisation is recruiting maths, physics and computing experts to devise groundbreaking algorithms that will automatically extract information from huge volumes of speech, text and image content gathered “across the full range of modern communications media”.
“A Strange Alliance: Are the Saudis Bankrolling Israel’s Mossad?” appears on his blog. Lando’s source is named only as “a friend, with good sources in the Israeli government.” He wrote, “The head of Israel’s Mossad has made several trips to deal with his counterparts in Saudi Arabia-one of the results: an agreement that the Saudis would bankroll the series of assassinations of several of Iran’s top nuclear experts that have occurred over the past couple of years.
At this stage, the “battle for Syria” is a specific role for foreign intelligence agencies, which in the summer of this year, significantly expanded its operations in the country. American, British, Turkish, French and Qatari and Saudi secret services are particularly active on the weakening of the regime of Bashar al-Assad. Their subversive work is multifaceted. Until recently, Western intelligence agencies have shown themselves very carefully. This was explained by fears of the U.S. and its European allies to help to strengthen the Islamist component of the Syrian opposition.
It is unlikely that the recent U.S. and NATO setbacks in the war and the Taliban successes could have occurred without enemy “moles” within the Western forces. An eventual history of this Afghan war will likely highlight the successful espionage efforts of the Taliban and its allies within Pakistan’s Inter-Service Intelligence agency (ISI).
Welcome Mali, our newest crisis! Open your maps. France used to rule Mali as part of its West African Empire, and still has deep financial, military, commercial and intelligence interests in the region.Not so long ago, France installed West African leaders, financed them, and kept them in power using small garrisons of tough Foreign Legionnaires. Secret payments continue today. Spooks from France’s DGSE intelligence agency, and “special advisors” are active behind the scenes in West Africa as well as North Africa.
Reports of “discreet” action by Western intelligence agencies are not surprising, according to Erich Schmidt-Eenboom, head of the Peace Policy Research Institute.
“The US intelligence agency CIA has been active for months, mainly in Turkey,” he told DW. “The intelligence agencies that brought about the fall of the Gadhafi regime in Libya are now at work in Syria,” Schmidt-Eenboom added.
Special forces in both Canada and the United States are taking a close look at Canadian-made mini-submarines for the murky world of covert operations. The cutting-edge subs, some of which are built in Canada, are seen by some in the U.S. Special Forces community as essential for specialized top-secret operations against threats such as al-Qaida in coastal countries.
The Canadian government has been orchestrating briefings that provide energy companies with classified intelligence from the Canadian Security Intelligence Service, the RCMP and other agencies, raising concerns that federal officials are spying on environmentalists and First Nations in order to provide information to the businesses they criticize.
The secret-level briefings have taken place twice a year since 2005, and are detailed in documents obtained under the Access to Information Act, and in publicly-available government files.
Canadian spies’ ‘Camelot’: Defence hoping to attract world-class talent with $880M intelligence complex
Canada’s electronic spy organization says that the state-of-the-art headquarters now being built in an Ottawa suburb will make it a leader among its allies and attract the best and brightest of spies, according to newly released government documents obtained by The Ottawa Citizen.
When finished in 2015-16, Communications Security Establishment Canada’s new $880-million spy campus in Gloucester is expected to be home to more than 1,800 employees.
The IDF’s top intelligence officers toured the Golan Heights on Thursday in preparation for the possible disintegration of the Syrian regime and its expected ramifications.
IDF Military Intelligence chief Maj. Gen. Aviv Kochavi and senior Military Intelligence officers discussed “how to adapt the tools, intelligence collection methods, and research of Military Intelligence to the threats in the region.”
A note prepared by the Research and Analysis Wing(RAW) on the recent unrest in the North-East says, “ISI is being used by Chinese intelligence agencies as a surrogate.”
The note has been forwarded to the home ministry. According to intelligence agencies, Indian insurgent groups are being provided assistance in the form of money and weapons by the Chinese agencies through ISI.
The Supreme Court on Thursday called for an end to military operations against the Baloch and for the disbanding of the ‘death squads’ of the intelligence agencies operating in Balochistan. The court also sought the civil and military leadership’s “black and white” reaction to the worsening law and order situation in the restive province and to the suggestions made by former chief minister Balochistan Sardar Akhtar Mengal.
France has announced the deployment of a military mission dubbed Opération Sabre to rescue its nationals held hostage and flush out Islamist terror groups in the West Africa region.
French officials said 80 military vehicles, helicopter pilot trainers as well as commandos from contingents in Afghanistan and the Horn of Africa were expected to join Operation Sabre or sword.
The attack in Benghazi, Libya, that killed Ambassador J. Christopher Stevens and three other Americans has dealt the Central Intelligence Agency a major setback in its intelligence-gathering efforts at a time of increasing instability in the North African nation.
Among the more than two dozen American personnel evacuated from the city after the assault on the American mission and a nearby annex were about a dozen C.I.A. operatives and contractors, who played a crucial role in conducting surveillance and collecting information on an array of armed militant groups in and around the city.
The secret sisterhood admit that they often feel they are “living in a movie, on a constant high” but are at pains to dismiss the idea that they are merely sexual weapons.
“A man who wants to gain access to a forbidden area has less chance of being allowed in. A smiling woman has a bigger chance of success,” Yael, a Mossad legend, tells Lady Globes.
“We use our femininity because any means is valid,” says Efrat, another agent.
Giraldi said he thought there were 15-20 high-ranking CIA agents in Turkey working on the Syrian conflict alone.
“They would be paramilitary agents,” Giraldi said. “They would be based at the consulate in Adana or the İncirlik Air Base, but could operate in the field as well,” Giraldi said, adding that the agents would not cross into Syria but would direct intelligence operations from within Turkey in collaboration with Turkey’s National Intelligence Agency (MİT).
Western intelligence officials told the British Telegraph on Thursday that Iranian President Mahmoud Ahmadinejad has personally sanctioned the dispatch of the experienced officers to ensure that the Assad regime survives the threat to its survival.
According to the report, Iran has also shipped hundreds of tons of military equipment, including guns, rockets, and shells to Syria through the regular air corridor that has been established between Damascus and Tehran.
Intelligence officials believe the increased Iranian support has been responsible for the growing effectiveness of the Assad regime’s tactics in forcing anti-government rebel groups on the defensive.
Britain’s intelligence service is looking beyond BAE Systems Plc, Lockheed Martin Corp and other big defence contractors to an untapped army of independent innovators for tools to fight terrorism and for cyber security.
The Government Communications Headquarters spy agency and the MI5 domestic security service have teamed with the defence ministry to enlist small-and medium-sized companies they have not previously worked with, the agency said today.
The procurement partnership marks the first time the ministry’s Centre for Defence Enterprise is working with the intelligence community. The goal is to find university startups and companies with technology for covert surveillance and online identity verification. GCHQ and MI5 can fund research activities, with CDE in charge of the technical assessment and program management.
The core of Russian intelligence services´ interest on the Czech Republic´s territory in 2011 were the areas of politics and economy, the Czech military secret service (VZ) says in its annual report released today.
The Chinese intelligence services, on their part, sought mainly technological espionage, says the VZ, which comprises both intelligence and counter-intelligence teams of the Czech military.
The VZ also detected activities that intelligence services from the Middle East pursued in the Czech Republic, the VZ says in an unclassified part of its report that is available to the public.
As it became known to Kommersant, the foreign intelligence service (SVR) today announced three closed tenders worth more than 30 million rubles, the purpose of which is to develop new methodologies for monitoring the blogosphere. The main task is the “mass distribution of informational messages within a given social networks with the purpose of forming of public opinion”.
The documents stated that the purpose of this virtual army will be “mass distribution of informational messages at specific social networks, using existing user accounts, with a view to shaping public opinion, statistics gathering and analysis of efficiency of informational wave”,
DARPA’s sister agency — the Intelligence Advanced Research Projects Activity, which funds experimental projects for the U.S. intelligence community — is running a four-year, $50-million program that pays people willing to predict major world events, including wars and terrorist strikes. Unlike the earlier scheme, participants can’t profit from their predictions.
The study, known as Aggregative Contingent Estimation, is designed to see whether the 17 agencies in the U.S. intelligence community can aggregate the judgment of its thousands of analysts — rather than rely on the expertise of just a few — to issue more accurate warnings to policy makers before and during major global events.
THE TIMES reports that British bases are providing Syrian rebels with vital intelligence information.
If true, the information probably comes from the Ayios Nikolaos base – a listening station of the spying network ECHELON.
The top secret base, which includes living quarters for British servicemen and their families, is located near the Green line, two miles east of the town of Famagusta and 15 kilometres north of Ayia Napa.
Land around the base is covered with satellites, radar and radio masts.
German spies are stationed off the Syrian coast and are passing on information designed to help rebels in their fight against President Bashar al-Assad, a newspaper reported on Sunday.
Agents from Germany’s foreign intelligence service (BND) are operating on ships off the coast with technology allowing them to observe troop movements 600 kilometres (400 miles) inside the country, said the Bild am Sonntag weekly.
They pass their findings onto US and British officers who then supply the rebels with the information, Bild said.
In a press statement, Deputy Prime Minister Bülenç Arınç announced that the National Intelligence Organization (MİT) was sharing intelligence with Iran. This provided the answer the Americans have been looking for. American intelligence units have been suspicious that Turkey is sharing information received from American Predator drones with Iran. The US has made it clear that they would be uncomfortable with such an arrangement.
The Israeli lobby has raised a campaign in Washington pushing for recognition that Turkey has been sharing intelligence received through American technology with Iran, and stressing that the US should no longer sell Predator drones to Turkey.